CVE-2008-1615
kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
El kernel de Linux versión 2.6.18 y posiblemente otras versiones, cuando corren bajo arquitecturas AMD64, permite a usuarios locales provocar una denegación de servicio (caída) a través de determinadas llamadas ptrace.
Johannes Bauer discovered an integer overflow condition in the hrtimer subsystem on 64-bit systems. This can be exploited by local users to trigger a denial of service (DoS) by causing the kernel to execute an infinite loop. Jan Kratochvil reported a local denial of service condition that permits local users on systems running the amd64 flavor kernel to cause a system crash. Paul Harks discovered a memory leak in the Simple Internet Transition (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited by remote users to cause a denial of service condition. David Miller and Jan Lieskovsky discovered issues with the virtual address range checking of mmaped regions on the sparc architecture that may be exploited by local users to cause a denial of service. This updated advisory adds the linux-2.6 build for s390 and the fai-kernels build for powerpc which were not yet available at the time of DSA-1588-1.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-04-02 CVE Reserved
- 2008-05-08 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
CAPEC
References (29)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/30112 | Third Party Advisory | |
http://secunia.com/advisories/30252 | Third Party Advisory | |
http://secunia.com/advisories/30294 | Third Party Advisory | |
http://secunia.com/advisories/30368 | Third Party Advisory | |
http://secunia.com/advisories/30818 | Third Party Advisory | |
http://secunia.com/advisories/30890 | Third Party Advisory | |
http://secunia.com/advisories/30962 | Third Party Advisory | |
http://secunia.com/advisories/30982 | Third Party Advisory | |
http://secunia.com/advisories/31107 | Third Party Advisory | |
http://secunia.com/advisories/31628 | Third Party Advisory | |
http://www.securityfocus.com/bid/29086 | Vdb Entry | |
http://www.securitytracker.com/id?1020047 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42278 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9563 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | as_4 Search vendor "Redhat" for product "Enterprise Linux" and version "as_4" | - |
Affected
| in | Amd Search vendor "Amd" | Amd64 Search vendor "Amd" for product "Amd64" | * | - |
Safe
|
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | es_4 Search vendor "Redhat" for product "Enterprise Linux" and version "es_4" | - |
Affected
| in | Amd Search vendor "Amd" | Amd64 Search vendor "Amd" for product "Amd64" | * | - |
Safe
|
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | ws_4 Search vendor "Redhat" for product "Enterprise Linux" and version "ws_4" | - |
Affected
| in | Amd Search vendor "Amd" | Amd64 Search vendor "Amd" for product "Amd64" | * | - |
Safe
|
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 4 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "4" | - |
Affected
| in | Amd Search vendor "Amd" | Amd64 Search vendor "Amd" for product "Amd64" | * | - |
Safe
|